- Audience: Intelligent Transportation System traffic operators and field techs
- Goal: Recognize phishing, privilege escalation, “man in the middle”, and social engineering attacks
- Strategy: Role plays scaffolded with references. Learners can read up on attacks first or dive right into the
- Users say: “Fabulous! I would like to see (our organization) use this for our security training.”
- Click the lock to test your cyber skill!